Вернутся на главную старницу

Investigation of IS incidents

Our experts determine the reasons and methods of an attack

Over 80 000 cyberattacks occur daily

On investigation of IS incidents

Protect yourself and your business

The Center’s experts provide services of investigating the incidents related to unauthorized access, deletion, modification of data, identification of the facts of penetration and infection with specialized malicious software\n\nAs part of the services, we conduct the following work:

Network activity analysis

Network activity analysis

Log analysis

Log analysis

Databases

Databases

Recover deleted information

Recover deleted information

Search and localize the attack vector

Search and localize the attack vector

Identify leaks of personal and confidential data

Identify leaks of personal and confidential data

Reveal the facts of failure of the technical security support systems and other equipment

Reveal the facts of failure of the technical security support systems and other equipment

Identify fraudulent transactions in credit and financial systems

Identify fraudulent transactions in credit and financial systems

Reconstructing an incident

Reconstructing an incident

A competent approach to collection of digital evidence not only will allow to reconstruct the incident, but also enable to reveal the ways and background for occurrence of the incident.

Based on results of the services, a report is submitted, containing expert evidence and distribution of the found indicators of abnormal and harmful activities by risk level.

Contact us for more details

Leave request
Contact us for more details